Nearly 90% of all Internet traffic is encrypted. And F5 Labs threat research shows that 68% of malware uses encryption to hide when calling back to command and control.
Decrypting and re-encrypting traffic is computationally intensive, and many inspection tools—like next-generation firewalls and malware protection platforms—are simply unable to decrypt at scale. But visibility into encrypted traffic is not enough. The daisy chain of decryption and re-encryption through multiple security devices induces unnecessary latency and complexity. Policy-based orchestration breaks the daisy chain to most effectively stop malware and protect user privacy.